Overview:
Recently, a significant threat to DNS, the system that translates names you can remember (such as www.doxpara.com) to numbers the Internet can route (66.240.226.139) was discovered, that would **allow malicious people to impersonate almost any website on the Internet**. Software companies across the industry have quietly collaborated to simultaneously release fixes for all affected name servers. To find out if the DNS server you use is vulnerable, go to http://www.doxpara.com/ , and click on 'Check my DNS'.

It may sound like an Apple problem, because they haven't issued a patch for their server products, but it affects us all because while other manufacturers *have* issued patches, it is up to the individual ISP's, DNS servers, etc. to *install* said patch. And according to my rudimentary searches, at least 50% of recursive name servers are unpatched.

When I'm able to, I'll update this post with live links (I couldn't get my WYSIWYG editor to work, and this is too important to wait on) Done.